Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_base_mss. While reading sysctl_tcp_base_mss, it can be changed concurrently. Thus, we need to add READ_ONCE() to its readers.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.17, < 5.4.208 |
Related Weaknesses (CWE)
References
- https://git.kernel.org/stable/c/30b73edc1d2459ba2c71cb58fbf84a1a6e640fbfPatch
- https://git.kernel.org/stable/c/4d7dea651b7fe0322be95054f64e3711afccc543Patch
- https://git.kernel.org/stable/c/514d2254c7b8aa2d257f5ffc79f0d96be2d6bfdaPatch
- https://git.kernel.org/stable/c/88d78bc097cd8ebc6541e93316c9d9bf651b13e8Patch
- https://git.kernel.org/stable/c/9ca18116bc16ec31b9a3ce28ea1350badfa36128Patch
FAQ
What is CVE-2022-49597?
CVE-2022-49597 is a vulnerability with a CVSS score of 4.7 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: tcp: Fix data-races around sysctl_tcp_base_mss. While reading sysctl_tcp_base_mss, it can be changed concurrently. Thus, we need t...
How severe is CVE-2022-49597?
CVE-2022-49597 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-49597?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.